Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 17:17

General

  • Target

    fd4a5c01d3b10976ae44029e7672e1b0.exe

  • Size

    672KB

  • MD5

    fd4a5c01d3b10976ae44029e7672e1b0

  • SHA1

    50a8d46d87c47572e6f30dfafd11ce9964c064ab

  • SHA256

    378a19ddfac8651e76b0abb65fb7afd10e973322be7148a8f97adb16dbd057a9

  • SHA512

    ee524662d83f36ce0c5da186e26332b97d2bea4a507734d8a8dbcd8da4732e2e279235481eb9e2b657d84632e7cd7e12070337e1575d0169315b3c5e3829be18

  • SSDEEP

    12288:seBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:sJIUCNd0nKwYvX+UhbW9eM

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 26 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2984
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2592
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2548
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1736
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:1324
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 184 -InterruptEvent 170 -NGENProcess 174 -Pipe 180 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 17c -InterruptEvent 218 -NGENProcess 220 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:860
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\iardraeb\cmd.exe

    Filesize

    92KB

    MD5

    007ab38408a11fab2f3fa3cbc09db108

    SHA1

    02ad4cb3663f9f008d584220a77d4ff5201e72a1

    SHA256

    92734bc8b668f2c8b6f41233fe15ca2660e2d04503e11407d443d27c6a6f6d77

    SHA512

    6ce8bfd05aedaa7b92693726005163fd002713012b3384a1646c6545ee088d140a00426633a2b33fa409966fb23cdb17affe07a397807601bf0a47e8fe77e2a3

  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

    Filesize

    872KB

    MD5

    60904b7250e399a88e6249ea70571578

    SHA1

    690e40d2050caa4872680802db1b98229e8e23b8

    SHA256

    45712da7798314a28ce86323cb9e8ea84a1b4402d1f4cc166d9b1c43edc16c26

    SHA512

    62323b19a80ad85198d0e116d3ff76f8ac82cff7103686bb2df0880eea6ebf483150eae6e6d280055a16b8eb4ec44ae0424718e892f66712197c3f9da8d3bfaa

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    257KB

    MD5

    7cb6a346608111defffcb417e5747602

    SHA1

    07f76eb105e6ad3143355fda920ac032fd763387

    SHA256

    7938be3a7e9827c3fd771036f5cb946483ae8b3d12c799e517ca5d52a361fe62

    SHA512

    b87157a6a73c639b600154c5e9a89562cec3108fc0d8a08fe73733bc13b425743e763db814abc6384b1f1e02d4f8e6f7bf4cbb88fcac1f76789796e1c4ae3914

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    453KB

    MD5

    cad77d6732386173df7e15d75d9e1d73

    SHA1

    7624232526db6399fb28a90339f9c66d3c3148ac

    SHA256

    08c088eead8d9a27d3157cdf9381362bf6ac9f4dadae01aa40bde91c93c8bc16

    SHA512

    8660f45c9828a0e50169fb754e04bb63e1555b292e6163356bcde70b76fa994dc8053e4b5ea0ffc2d68b906caac654fb2e23b6b07ef6b37de8f78628930b7e83

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    551f26f3fa5831769bca0d96e9a64c67

    SHA1

    1ac6439398fb9f085da7bf878877d721c3dffa37

    SHA256

    c7c990fd2e56e1817333ecf02111b7ce74ef40286e3a421c0e64b5b5b5fca860

    SHA512

    2b83a73828b26b61c05dd88ebcafbd2ff7c31736d7308a14b09720754226c535cd120068d201b2540f44b03a5bd68f0d875b497d57af98ef6d0a781125e45051

  • C:\Windows\System32\alg.exe

    Filesize

    92KB

    MD5

    c2a4642e07fdcc66f593cd02eb3eeff3

    SHA1

    6524bad1fd395fd3804bef0b90b9fbcbcc89a750

    SHA256

    e5e260ca42b67266667c0e9d912c476e2ec44fae1082a1fcc8cc48860b830ccb

    SHA512

    ed1b8301ce96521aa4d4c458e1fbc8ea80f9a7c8bf6985ca7c9226fe2bfc6f7e23cf45fef89d98dda30cfd5045031ed3f4ca9f6e64f70cde3c4deea3ec6f8eeb

  • C:\Windows\System32\dllhost.exe

    Filesize

    405KB

    MD5

    9ca2c69eec5b4fa8fde1554170acf9d0

    SHA1

    6fd4fe15ed3269469436609ebf4dbb148676934a

    SHA256

    b0a2873c91a609535b5ab0a66b0e84858aea41cf2042b0de1349a061ea169a4f

    SHA512

    0ea82342532b2de668d5dbb89d3ce3e07256e6159cf584ae1081e7b4477b779ebb480ded4720362e270fbe2253497f0cb33fbc91381f0b10f112709901512b01

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    381KB

    MD5

    98dcd4a8cda99aeb728ff946903d76e6

    SHA1

    798237beeedb69e1d2337f8737ecc3381cb3fa2f

    SHA256

    4fcf729c0b569dd8e4fa56cb9e7c674bfbf1167214c2d009637177fd32ce07fb

    SHA512

    6dcbb2a5892b3c2405cc54e776d995acf715865fadfee5066ff76f3281c17b35b1e207c3bf9d9c93b2b4261fd9c41cc07962caff208228e008499f4a66e21ba6

  • \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe

    Filesize

    613KB

    MD5

    f8b9fc27f5b63c53af34a7630dc1e2f6

    SHA1

    54b9de6bf5d06421990ea859d4987194c7543018

    SHA256

    567c1e889eb77e859069a0655bd58b2f2fc3cc64c4774c204ddb336013f5787a

    SHA512

    390a89fbeb22dd4954fb1579c7187279f57e557d078c1582a7938d260f509599cb09e07b8603deeb32cf433b87095ebe4901d28d96c32452cc507e780d4d8cdb

  • \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    217KB

    MD5

    dc6d67c8a804d42c8e51d00072e5916c

    SHA1

    6d4f271dcb97367d8772b2a24ffb4dfe187306b4

    SHA256

    225a6ebedd6543734da4218b0420eab50464ec4bcea325734cc1bc631fd71868

    SHA512

    4750d709f8ff6b14462a71ee88153a01ba08292e104648dc5b7d340a5edda1394d4851a15860a2285be1161f10136429371bde8d4b64f8140829d84f7b503b39

  • \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe

    Filesize

    506KB

    MD5

    47c9473fb11cc0fe68fb38e0ac4b7700

    SHA1

    bd4902e7782ee06e04598a0d2139eb9aed5ac42f

    SHA256

    c687a70e3a3b590c3f75d9e0345c6baad4b4298db353609b6dc69846615bbed3

    SHA512

    b082c1dcb0a1e2263dacf22d8f288ce2911ff60a71d4b17f703256dbc838654adf382dd33ce76b4019d6205e70c61e68c27f316d73e61a81ae445b3231b85c63

  • \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe

    Filesize

    484KB

    MD5

    8e6309b5a8bea44d44691dafe3990081

    SHA1

    caff5e8ceeb8171b0d2fc04b8316b33da0b676e9

    SHA256

    7af5a25c6f8e7e22c070edb2fdf2540d99204197aed096789838cd9ce205b9df

    SHA512

    2318f860cbad2776e7ff5625718f21e8b6b3b9ac438fea5e31d41e186da8488353dff9837255c8dd1f8ca6279f0e6387cb2f0172cd5f02798ebb9de3e8e86251

  • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

    Filesize

    480KB

    MD5

    7c85be363eb0fd3f77ba0db449fc165f

    SHA1

    c26c42574bf2a0dd76fb218089812cad5308b2f0

    SHA256

    a046a6646f3ec6e0b6324f00fd283af3bd33f9726fcbd99be0f355c044fffc06

    SHA512

    8ee58b9d26a864281b636a6af530487c08d4e44d12e8ee35673ad7342443a1b7b38fd2fa74e76bbe3ea482cb7781978784aaa09b37e11a68a89e37e0c36147de

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    431KB

    MD5

    1e4083235237847e4bdbe5920e263c78

    SHA1

    f8254086761fce4d4fc7cbe97535128ada4a1b48

    SHA256

    106a8919e5ff1eaa6b3b7001f0229c24c436a87d74a964e015cd8b5f9e7e5b77

    SHA512

    ec96672f93de36049cd7f8596173c440265e67325bf3228e233fbf8dc46c595ce73e69c6592918d0f6a77a6325ee3ff7092d2bb511a9e5c22b110c7f7559352f

  • \Windows\System32\alg.exe

    Filesize

    472KB

    MD5

    3d944b6bc8a8f4d9a1284422f5f3d8cd

    SHA1

    2e0a7ed1d18a1b0bfabfcb1c453e4c86b0e9bc9e

    SHA256

    4ee4f0dc5b3b50eaaaa979fb6ad65a5e9233d507bf1faa14ed0113a9e62b87e5

    SHA512

    64c9b611e6ccc3504673c75c3e4c5fd7891a79e5843d4f07bc870fc87706268f875c65927675328c4f1a86eaf373fbfe9bdefb7d4c6ef3df1658cd4d5fd044a3

  • memory/860-129-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

    Filesize

    9.9MB

  • memory/860-122-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/860-124-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/860-134-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/860-135-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

    Filesize

    9.9MB

  • memory/1540-100-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

    Filesize

    9.9MB

  • memory/1540-99-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/1540-98-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/1540-130-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/1540-131-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

    Filesize

    9.9MB

  • memory/1736-59-0x0000000010000000-0x00000000100D1000-memory.dmp

    Filesize

    836KB

  • memory/1736-60-0x0000000010000000-0x00000000100D1000-memory.dmp

    Filesize

    836KB

  • memory/1736-70-0x0000000010000000-0x00000000100D1000-memory.dmp

    Filesize

    836KB

  • memory/2200-1-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-0-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-19-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-17-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

    Filesize

    1024KB

  • memory/2200-3-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

    Filesize

    1024KB

  • memory/2308-78-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/2308-123-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/2308-77-0x000000013F840000-0x000000013F917000-memory.dmp

    Filesize

    860KB

  • memory/2548-43-0x0000000010000000-0x00000000100A4000-memory.dmp

    Filesize

    656KB

  • memory/2548-36-0x0000000010000000-0x00000000100A4000-memory.dmp

    Filesize

    656KB

  • memory/2548-35-0x0000000010000000-0x00000000100A4000-memory.dmp

    Filesize

    656KB

  • memory/2592-55-0x000000013FFE0000-0x00000001400A6000-memory.dmp

    Filesize

    792KB

  • memory/2592-27-0x000000013FFE0000-0x00000001400A6000-memory.dmp

    Filesize

    792KB

  • memory/2592-28-0x000000013FFE0000-0x00000001400A6000-memory.dmp

    Filesize

    792KB

  • memory/2768-93-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

    Filesize

    760KB

  • memory/2768-133-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

    Filesize

    760KB

  • memory/2768-94-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

    Filesize

    760KB

  • memory/2984-29-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

    Filesize

    820KB

  • memory/2984-20-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

    Filesize

    820KB

  • memory/2984-53-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

    Filesize

    820KB

  • memory/2984-18-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

    Filesize

    820KB

  • memory/2984-54-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

    Filesize

    820KB